miércoles, 16 de noviembre de 2016


HI  BRO'S

I've returned after a few time because I want to explain to all people who doesn't know about :
Risk of social network
Habits of efective network security
Propietary software vs free software 
Types of software licence

Let's start .  


RISK OF SOCIAL NETWORK


Most of people think tha social network is always secure but If you read this you will change a bit your opinion. Social networking sites allow someone to post information that thousands of other users can read. But that's not at all. In this Q&A, information security threats expert Ed Skoudis reveals how sites like Myspace and Youtube let the bad guys post something more dangerous: malware.

I'm going to tell you some examples of this :

Fraud and thef:

Posting too much personal information in your social networking profile could result in identity theft, financial fraud and monetary losses.

You should consider whatever you post as being accessible to the entire world.If you would not put it on a public bulletin board, then do not post it online. Even if you delete your profile, it can still remain on the Internet.

As in any type of fraud, fraudsters will go after the easiest victims first.
 They will target social networking accounts that are not using the security features available on the site, in the Internet browser or in security and anti-virus software.

The easiest way for fraudsters to get access to your information is to send you a “friend request” or something similar. Many people assume that only people who know you or have contacts in common would send you a request, and accept it without questioning. You should never accept a friend request if you do not know the person sending it or would not be comfortable with that person having access to your personal information and photos.


Once fraudsters have access to or control of your profile, they can use this information for identity theft.
 

They can also try to use your account to commit other types of fraud, like telling people you are in trouble and asking them to send money to help you out. 


Fraudsters are trying to get their hands on any information they can find out about you. Your personal details may not be harmful on their own, but once they are combined, you can be at a higher risk for fraud.


Loss of privacy:

One of the issues that stems from the use of social media these days is the loss of privacy. People often post things without a filter or any thought of who might read their post. 
The issue of privacy within the social media community has become a hot topic among users over the past several years. The lack of the ability to post on these websites without it being seen by anybody and everybody has created a system of wide open public intrusion. To further the problems with this lack of privacy is the naive nature that teen users show with their over sharing on these websites. Social media and internet giants mass data storage of these websites without user consent and the availability of it for third party users shows that these websites have violated user privacy. This is a big issue that needs to be addressed and needs to be considered when posting on these websites. In the mean time, be careful how much you chose to share on these sites because you never know who will see it.

Acces to unsuitable contents:

It’s possible that children may come across things online which are inappropriate for their age and stage of development. You can use filters to block this content and prepare your child by showing them the best ways to avoid it.
 

61-percent-2

Habits

of children will go online to watch video clips 
 
1d3aee203e8ca390234f3ba5f5a1c73f31d60fc6

Awareness

of parents say age-inappropriate content is their top concern 
 
63-percent

Concerns

of teens believe that accessing inappropriate content online accidentally is an issue 
Cyber bulling


Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.

Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles




HABITS OF EFECTIVE NETWORK SECURITY


3 Secret Habits of Really Effective Network Security Programs:

  •  Make Sure there is Cooperation Between the Network, Security and Application Teams:Siloing the various teams in your department can stifle your security activities, and keep you from reaching your goals. Network operations staff, the security staff and the application teams should all be communicating fluidly, with 100% of top-tier organizations in the survey citing this as a best practice.

  •  Utilize DNS/DHCP Data to it’s Full Potential:This is a slowly growing but serious differentiator between effective and mediocre security departments. According to the survey, close to half of top-tier organizations use DNS/DHCP data to discover other new devices, compared to zero other contenders.


  • Commit to the Continual Use of Intelligence:The most successful organizations have a mechanism in place that forces them to commit to security intelligence. They’re 6x as likely to have deployed an SIEM, and 4x as likely to invest in machine-readable threat intelligence.


PROPIETARY OF SOFTWARE VS FREE SOFTWARE

The term open source refers to software whose source code — the medium in which programmers create and modify software — is freely available on the Internet; by contrast, the source code for proprietary commercial software is usually a closely guarded secret.
The most well-known example of open source software is the Linux operating system, but there are open source software products available for every conceivable purpose.
Open source software is distributed under a variety of licensing terms, but almost all have two things in common: the software can be used without paying a license fee, and anyone can modify the software to add capabilities not envisaged by its originators.
standard is a technology specification whose details are made widely available, allowing many companies to create products that will work interchangeably and be compatible with each other. Any modern technology product relies on thousands of standards in its design — even the gasoline you put in your car is blended to meet several highly-detailed specifications that the car’s designers rely on.
For a standard to be considered an open standard, the specification and rights to implement it must be freely available to anyone without signing non-disclosure agreements or paying royalties. The best example of open standards at work is the Internet — virtually all of the technology specifications it depends on are open, as is the process for defining new ones.
An Application Programming Interface (API) is a feature of a software application that allows other software to inter-operate with it, automatically invoking its functionality and exchanging data with it. The definition of an API is a form of technology standard. The term open API doesn’t yet have a universally accepted definition, but it’s generally expected to be “open” in the same manner as an open standard.
The common theme of “openness” in the above definitions is the ability of diverse parties to create technology that interoperates. When evaluating your organization’s current and anticipated software needs, consider a solution’s capability to interoperate as an important criterion. To extend the value of your technology investment, select a software solution that is based on open standards and APIs that facilitate interoperability and has the capability for direct integration between various vendors’ products.

TYPE OF SOFTWARE LICENSES

    • Individual: License type for single installation
    • OEM (Original Equipment Manufacturers): License type for software that is already installed in the hardware.
    • Named User License: License Type for a specific user.
    • Volume: License Type supporting multiple users.
    • Client Access License (CAL): License type that gives a user the rights to access the services of the server.
    • Trial License: License Type for trial versions of software.
    • Enterprise (Perpetual): License Type that does not require renewal and is for life long.
    • Concurrent License: License Type for software that can be accessed by a specific number of users at a time.
    • Free License: License Type for freeware software.
    • Enterprise Subscription: License Type that requires renewal for every specific period.
    • Node Locked: License Type for workstations with specific configurations.

BIBLIOGRAPHY:
https://www.smseagle.eu/2016/06/01/3-secret-habits-of-really-effective-network-security-programs/
https://www.manageengine.com/products/service-desk/help/adminguide/configurations/software/software-license-type.html
https://opensource.com/resources/what-open-source
https://www.stopbullying.gov/cyberbullying/what-is-it/
https://www.internetmatters.org/issues/inappropriate-content/





















miércoles, 19 de octubre de 2016


MY FIRST TIMETOAST 


Hi bros, I'm here again, How is going your course ? If it is great I agree , my course is going better than I expected .

Talking about me I'm writting this blog because in technology we are learning about timelines, and i've written one about the history of the computers, I thought that it was boring but it is really interesting so I want to put the link here, if you  will see it you'll be surprised. 

Thanks and see you soon .





http://www.timetoast.com/timelines/1373277

martes, 4 de octubre de 2016

My first blog 


Whats up bro ?

I'm Miguel Garcia , from 4º E.S.O and this is my first blog so y want to explain a bit of my life.
I was born a cold night of december , the 21th exactly, and since them I've been living in Almazan, Soria.
I study at Gaya Nuño, a high school of my village. 
I like the way I life , because I do a lot of sport, specially football, since 2012 I have played in C.D.San Jose, we have won the league two times row .
My principal hobbies are rap, play videogames and go partying.
I love rap , and I like rapping too, I have been rapping in pubs such as Pixies one or two times, and It has been a great experience. I have also done underground rap battles on Soria and Almazan .
I hope you liked this , I will try to do some bloggs like this , giving me know a little more . Thanks to read me and good luck for all of you if you have to redact your first blog too. 

SEE YOU SOON BBy$.